Some facets of complexity theory and cryptography: A five-lecture tutorial

@article{Rothe2002SomeFO,
  title={Some facets of complexity theory and cryptography: A five-lecture tutorial},
  author={J. Rothe},
  journal={Electron. Colloquium Comput. Complex.},
  year={2002}
}
  • J. Rothe
  • Published 2002
  • Computer Science, Mathematics
  • Electron. Colloquium Comput. Complex.
In this tutorial, selected topics of cryptology and of computational complexity theory are presented. We give a brief overview of the history and the foundations of classical cryptography, and then move on to modern public-key cryptography. Particular attention is paid to cryptographic protocols and the problem of constructing key components of protocols such as one-way functions. A function is one-way if it is easy to compute, but hard to invert. We discuss the notion of one-way functions both… Expand
6 Introduction to Cryptography 6.1 Symmetric Cryptosystems
    This section gives a short introduction to cryptography. It is based on the recent tutorial by Jörg Rothe. For an in-depth treatment of cryptography, please consult the Handbook of AppliedExpand
    Quantum Cryptography: A New Generation of Information Technology Security System
    • M. Sharbaf
    • Computer Science
    • 2009 Sixth International Conference on Information Technology: New Generations
    • 2009
    TLDR
    This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards. Expand
    Quantum cryptography: An emerging technology in network security
    • M. Sharbaf
    • Computer Science
    • 2011 IEEE International Conference on Technologies for Homeland Security (HST)
    • 2011
    TLDR
    The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, the future direction in which the quantum cryptography is headed forwards. Expand
    Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security
    For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emergingExpand
    Applicability of Cellular Automata in Cryptanalysis
    TLDR
    An extensive literature review of the cryptanalysis techniques is carried out, finds the gaps there in, in order to put the proposed technique in the perspective and also finds the applicability of Cellular Automata in cryptanalysis. Expand
    An Efficient Algorithm for Isomorphic Problem on Generic Simple Graphs
    • Ngoc-Bao Tran, D. Nguyen
    • Computer Science, Mathematics
    • 2008 Second Asia International Conference on Modelling & Simulation (AMS)
    • 2008
    TLDR
    Algorithm proposed is applied to undirected simple graphs so that (u, v) and (v, u) are considered to be the same edge and can be used into authentication methods based on graph isomorphism. Expand
    A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography
    TLDR
    This paper proposes integration of Advanced Encryption Standard (AES) algorithm with quantum cryptography, and shows that the Quantum AES produces complex keys which are hard to predict by adversaries than the keys generated by the AES itself. Expand
    Identity based secure authentication scheme based on quantum key distribution for cloud computing
    TLDR
    A formal security analysis has been performed using AVISPA tool that confirms the security of the proposed scheme and proves that it is robust against all security attacks. Expand
    A client/server implementation of an encryption system for fingerprint user authentication
    TLDR
    A client/server architecture to efficiently authenticate users by means of their fingerprint biometric feature is proposed and the results of the experiments show that such architecture is optimal for being applied. Expand
    Butterfly: Privacy Preserving Publishing on Multiple
    TLDR
    It is shown that it is possible to generate only one anonymized table to satisfy the k-anonymity on all quasi-identifiers for all users without significant information loss. Expand
    ...
    1
    2
    3
    ...

    References

    SHOWING 1-10 OF 172 REFERENCES
    Public-Key Cryptography
    • A. Salomaa
    • Computer Science
    • EATCS Monographs on Theoretical Computer Science
    • 1990
    TLDR
    This book gives a broad overview of public-key cryptography - its essence and advantages, various public- key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. Expand
    One-way functions in worst-case cryptography: algebraic and security properties are on the house
    TLDR
    Until recently, it was an open question whether one- way functions having the algebraic and security properties that these protocols require could be created from any given one-way function, and recently, Hemaspaandra and Rothe resolved this open issue in the affirmative, by showing that one-Way functions exist if and only if strong, total, commutative, associative one-ways exist. Expand
    Pseudorandomness and cryptographic applications
    • M. Luby
    • Mathematics, Computer Science
    • Princeton computer science notes
    • 1996
    TLDR
    The first half of the book shows how to construct a pseudorandom generator from any one-way function, and builds on this to construct other useful cryptographic primitives, such as private key cryptosystems,pseudorandom function generators, pseud orandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. Expand
    Decrypted secrets - methods and maxims of cryptology
    TLDR
    This 3rd edition of "Decrypted Secrets" has become a standard book on cryptology and has again been revised and extended in many technical and biographical details. Expand
    Public Key Cryptography
    • J. Seberry
    • Computer Science
    • Lecture Notes in Computer Science
    • 2000
    TLDR
    This talk focuses on the RSA Public Key Cryptosystem, a cryptographic system in which each encryption process is governed by not one but two keys, which allows one of the keys to be made public while its inverse is kept secret, giving the systems their name. Expand
    Associative one-way functions: a new paradigm for secret-key agreement and digital signatures
    We propose associative one-way functions as a new cryptographic paradigm for exchanging secret keys and for signing digital documents. First, we precisely deene these functions and establish some ofExpand
    Contemporary Cryptology: The Science of Information Integrity
    From the Publisher: The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. InExpand
    On characterizing the existence of partial one-way permutations
    TLDR
    It is shown that the existence of partial one-way permutations can be characterized by separating P from the class of UP sets that, for all unambiguous polynomial-time Turing machines accepting them, always have easy (i.e., polynometric-time computable) certificates. Expand
    Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    In this paper the generality and wide applicability of Zero-knowledge proofs, a notion introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and interactive proofsExpand
    Some facets of complexity theory and cryptography
    TLDR
    This tutorial gives a brief overview of the history and the foundations of classical cryptography, and then presents topics of cryptology and of computational complexity theory. Expand
    ...
    1
    2
    3
    4
    5
    ...